This article explains how to restore individual files in one computer backup to a different computer in your E2 protected footprint.
With the E2 appliance, you can restore individual files stored within backup sets. During this process, one or more selected volumes will mount as virtual drives on the destination computer. The drive(s) will contain the files as they were backed up in the selected backup set.
With E2, you can restore individual backed up volumes from 64-bit Windows computers. This article explains how.
This article covers all the steps needed to back up a computer with E2.
You can recover a Windows computer from a Bare Metal Restore (BMR) backup. If you used automatic configuration, Portal automatically creates BMR backups for 64-bit Windows computers.
After you have failed over to the cloud, you can restore from the replica server back to your original source or to another server. The restore process workflow is different if you are restoring at the group level or at an individual level.
This article covers preparing recovery media for your E2 appliance. We recommend creating this media as soon as possible so it's ready in case of an emergency.
This article contains some potential issues that may occur during a bare metal restore attempt and what can be done to resolve them.
There are some cases where performing a seed backup over the network is extremely slow. In these cases, we can perform a seed backup using removable media instead. This involves receiving a removable media device from Carbonite, creating a local seed backup on the device, and returning the device to Carbonite. Upon receipt, the data from the device is manually inserted into your cloud storage.
The E2 Appliance is exclusively available for purchase for Carbonite Partners. This article details the purchase process.
This article lists the contents of the E2 Appliance package and a quick set of steps for setting up.
The E2 Portal is the online portal to control and monitor E2. Sign in with your E2 username and password to access those options. This article contains instructions for signing in.
The document embedded in this article is a comprehensive guide for installing and using the Oracle Plug-in to back up and restore Oracle databases.
E2 is a hybrid backup and recovery solution for small businesses with diverse IT environments and critical data requirements. Combining the speed of local data protection with the reliability of the cloud, E2 brings the power and simplicity of Carbonite to small businesses.
This article explains how to create, edit, disable/enable and remove users from your E2 account.
The document embedded in this article is a comprehensive guide to granular restores of Microsoft Exchange and SQL data.
Carbonite Recover protects any physical, virtual, or cloud server to the cloud. You identify the server you want to protect, and Carbonite Recover will replicate it to a virtual server stored in the cloud. The data is protected using Carbonite Availability real-time replication, also known as the Recover replication agent, which sends only file changes rather than copying an entire file, allowing you to more efficiently use server and network resources. In the event of a failure, you can failover to your replica server in the cloud with minimal downtime.
You can monitor the amount of storage space that is available on an E2 appliance and in the cloud using the online portal.
As an E2 customer, you will only need to update the Agent software on the systems that you are backing up. The software on your E2 appliance will be automatically updated.
Solving Common E2 Setup Issues
This is a comprehensive user guide for purchasing, setting up, and using E2.
E2 customers have a “Cloud Icon” on each backup in Carbonite Server Backup. This icon indicates the replication status of that job.
This article contains instructions for resetting your E2 password.
Before you begin with Carbonite Recover, you have servers you want to protect to the cloud. These servers are called your source servers.
User guide for Carbonite Recover
This article outlines the available options within the Carbonite Recover interface.
In the event you need to failover one or more source servers, you can quickly fail them over in the cloud. The failover process workflow is different if you are failing over at the group level or at an individual level.
You can view your computers, monitor your backups, and determine whether the last backup was sent to the cloud all from the E2 Portal.
When a new version of the Carbonite Recover agent is available, an information icon will appear next to the server on the servers page. Hovering over that icon shows a message ‘Upgrade Available. Use the Actions menu to upgrade.’ There are two ways to upgrade the agents running on the source (production) and target (cloud).
You may be experiencing an issue where a computer repeatedly reports that a pending reboot is preventing the installation of the E2 Agent Software, and rebooting the machine does not resolve it. If this is occurring, it is very likely due to Windows registry keys that were not properly adjusted by Windows after the E2 Agent software installation.
You may experience an error while automatically configuring a backup in Carbonite Server Backup. This error is most likely caused by entering the incorrect login credentials during the installation of the E2 Agent software on the computer to be backed up. E2 Agent software can only be installed using end user credentials, not Partner credentials. To fix this issue, run the E2 Agent software installation again in Repair mode.
If an E2 backup fails, it could potentially be caused by issues with Volume Shadow Copy Service (or "VSS"). VSS is a service in Windows that temporarily copies a static version of data for use by another program. E2 uses this service to clone live data in order to back it up. The checklist in this article can be helpful with preventing VSS issues when setting up new backups as well as investigating VSS problems with existing backups.
If you forget your encryption password for a backup, it is impossible to recover the files. E2 Support cannot help in that circumstance: there is no way to remove the password requirement or decrypt the files manually. Please take every precaution necessary to ensure you remember the encryption passwords you choose for your backups.
While monitoring backups, you may see a message that a backup "completed with warnings." Follow this article to investigate those warnings.
After the restoration is complete, you need to complete failback. This finalizes the identity transfer from the replica server to the failback source.
Use these instructions to add a server or a target appliance that has already been created to an environment.
A target appliance is a virtual server in the cloud created from a template provided by Carbonite. You must have at least one target appliance, and it can protect multiple source servers. However, you may need additional target appliances if you are protecting a larger number of disks or to help balance the load when protecting many servers.
You protect servers in groups, even if you have just one server in a group. Groups allow you to manage your servers in orchestration with each other.
Your environment must meet the following requirements.
On the Jobs page, click the name of a group to see job details. On the Details page, you will find group statistics as well as individual server details and statistics.
This article outlines the steps to add Environments in Carbonite Recover.
This article provides instructions on how to get started with Carbonite Recover.
This article outlines the Environment options for Carbonite Recover.
By default, you will receive email messages for the notifications generated by Carbonite Recover. Use the instructions within to change your email notification settings.
When you have your source servers in your servers list, you can protect those servers. You protect source servers in groups, even if you have just one source in a group. Groups allow you to manage your servers in orchestration with each other.
An environment is a collection of servers. An environment may also have workers or a hypervisor host. A source environment is used to discover and protect your source servers. A target environment is used for the cloud and to provision resources and failover servers in the cloud. You must add a source environment that you will then populate with the source servers you want to protect. You must also add a target environment that you will then populate with your target appliance.
Once you have an environment created, you can add servers or target appliances to the environment manually or through discovery. Discovery is the process of scanning a host in an environment to identify the servers on that host. You can also create a target appliance in your target cloud environment.
You can review your Carbonite Recover subscription usage at any time.
Instructions for setting up two-factor verification for Carbonite Server Backup.